Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

r1cksec@infosec.exchangeR

r1cksec@infosec.exchange

@r1cksec@infosec.exchange
About
Posts
4
Topics
4
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions
    r1cksec@infosec.exchangeR r1cksec@infosec.exchange

    A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions

    Link Preview Image
    Mapping Deception Solutions With BloodHound OpenGraph  - Configuration Manager - SpecterOps

    Deception and canary development implemented in SCCM can be used to alert upon cyber attacks and intrusions. This blog provides step by step guidance to implement deception solutions and use BloodHound OpenGraph for planning.

    favicon

    SpecterOps (specterops.io)

    #infosec #cybersecurity #redteam #blueteam #windows #dfir

    Uncategorized infosec cybersecurity redteam blueteam windows

  • It is possible as a low privileged user to parse the Windows event logs for any ASR exclusion
    r1cksec@infosec.exchangeR r1cksec@infosec.exchange

    It is possible as a low privileged user to parse the Windows event logs for any ASR exclusion

    Link Preview Image
    Cheesing Microsoft Attack Surface Reduction rules

    While working on varying engagements i have been messing with Microsoft Attack Surface Reduction (ASR) quite a bit, since clients often use it to make the life of adversaries(and red teamers) just a tad harder. While working on these engagements i have compiled some tips and tricks in order to bypass/evade some of the rules that ASR offers. In this post i will dive into what ASR is and some of tips and tricks that i often use to bypass/cheese my way around said rules… So strap in and lets get going with some basic ASR understanding.

    favicon

    . .\Primusinterp (primusinterp.com)

    #infosec #cybersecurity #redteam #pentest

    Uncategorized infosec cybersecurity redteam pentest

  • This cheatsheet maps common impacket workflows to their modern alternatives
    r1cksec@infosec.exchangeR r1cksec@infosec.exchange

    This cheatsheet maps common impacket workflows to their modern alternatives

    Link Preview Image
    GitHub - n00py/Outpacket: This cheatsheet maps common impacket workflows to their modern alternatives

    This cheatsheet maps common impacket workflows to their modern alternatives - GitHub - n00py/Outpacket: This cheatsheet maps common impacket workflows to their modern alternatives

    favicon

    GitHub (github.com)

    #infosec #cybersecurity #redteam #pentest

    Uncategorized infosec cybersecurity redteam pentest

  • The Live Terminal feature of Cortex XDR can be abused by attackers as a pre-installed, EDR-trusted C2 channel
    r1cksec@infosec.exchangeR r1cksec@infosec.exchange

    The Live Terminal feature of Cortex XDR can be abused by attackers as a pre-installed, EDR-trusted C2 channel

    Link Preview Image
    Abusing Cortex XDR Live Terminal as a C2 - InfoGuard Labs

    The Cortex XDR agent includes an incident response feature called "Live Terminal", which attackers can abuse as a C2.

    favicon

    InfoGuard Labs (labs.infoguard.ch)

    #infosec #cybersecurity #redteam #pentest

    Uncategorized infosec cybersecurity redteam pentest
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups